The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Federica Paci: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Elisa Bertino, Jason Crampton, Federica Paci
    Access Control and Authorization Constraints for WS-BPEL. [Citation Graph (0, 0)][DBLP]
    ICWS, 2006, pp:275-284 [Conf]
  2. Massimo Mecella, Mourad Ouzzani, Federica Paci, Elisa Bertino
    Access control enforcement for conversation-based web services. [Citation Graph (0, 0)][DBLP]
    WWW, 2006, pp:257-266 [Conf]
  3. Jacques Thomas, Federica Paci, Elisa Bertino, Patrick Eugster
    User Tasks and Access Control overWeb Services. [Citation Graph (0, 0)][DBLP]
    ICWS, 2007, pp:60-69 [Conf]
  4. Elisa Bertino, Elena Ferrari, Federica Paci, Loredana Parasiliti Provenza
    A system for securing push-based distribution of XML documents. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:4, pp:255-284 [Journal]
  5. Anna Cinzia Squicciarini, Elisa Bertino, Elena Ferrari, Federica Paci, Bhavani M. Thuraisingham
    PP-trust-X: A system for privacy preserving trust negotiations. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2007, v:10, n:3, pp:- [Journal]

  6. Verification of Access Control Requirements in Web Services Choreography. [Citation Graph (, )][DBLP]


  7. PriMa: an effective privacy protection mechanism for social networks. [Citation Graph (, )][DBLP]


  8. Minimal credential disclosure in trust negotiations. [Citation Graph (, )][DBLP]


  9. Trust establishment in the formation of Virtual Organizations. [Citation Graph (, )][DBLP]


  10. A privacy-preserving approach to policy-based content dissemination. [Citation Graph (, )][DBLP]


  11. Authorization and User Failure Resiliency for WS-BPEL Business Processes. [Citation Graph (, )][DBLP]


  12. Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes. [Citation Graph (, )][DBLP]


  13. VeryIDX - A Privacy Preserving Digital Identity Management System for Mobile Devices. [Citation Graph (, )][DBLP]


  14. VeryIDX - A Digital Identity Management System for Pervasive Computing Environments. [Citation Graph (, )][DBLP]


  15. Collective privacy management in social networks. [Citation Graph (, )][DBLP]


  16. Monitoring Contract Enforcement within Virtual Organizations. [Citation Graph (, )][DBLP]


  17. A Federated Digital Identity Management Approach for Business Processes. [Citation Graph (, )][DBLP]


  18. Privacy-preserving management of transactions' receipts for mobile environments. [Citation Graph (, )][DBLP]


  19. Efficient and privacy-preserving enforcement of attribute-based access control. [Citation Graph (, )][DBLP]


  20. An Interoperable Approach to Multifactor Identity Verification. [Citation Graph (, )][DBLP]


  21. Privacy-preserving Digital Identity Management for Cloud Computing. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002